Generating remote entanglement via disentangling operations

Generating remote entanglement via disentangling operations

Jennifer R. Glick patte399@msu.edu Department of Physics and Astronomy, Michigan State University, East Lansing, MI 48824 USA    Christoph Adami adami@msu.edu Department of Physics and Astronomy, Michigan State University, East Lansing, MI 48824 USA
August 19, 2019
Abstract

Shared entanglement between spatially separated systems is an essential resource for quantum information processing including long-distance quantum cryptography and teleportation. While purification protocols for mixed distributed entangled quantum states exist, it is not clear how to optimally distribute entanglement to remote locations. Here, we describe a deterministic protocol for generating a maximally entangled state between remote locations that only uses local operations on qubits, and requires no classical communication between the separated parties. The procedure may provide protection from decoherence before the entanglement is “activated,” and could be useful for quantum key distribution.

1 Introduction

Much of quantum information processing relies on entanglement as a resource. For example, entanglement that is shared between distant parties is necessary to implement Ekert’s quantum key distribution protocol for secure communication [1], to transfer quantum states using teleportation [2], or to establish large-scale quantum networks. Remote entanglement generation has been realized in many systems such as with optical photons [3, 4, 5], the nitrogen vacancy centers of solid state qubits [6], and superconducting qubits [7, 8, 9].

When manipulating entanglement, it is sometimes necessary to disentangle subsystems of an entangled system. Disentangling is, generally speaking, only possible under certain conditions [10], principally because of the relation between disentangling and quantum cloning (a single quantum cannot be disentangled [11]). It is possible, however, to disentangle known states, and in particular it is possible to disentangle subsystems of jointly entangled systems as long as some information about the quantum state is obtained.

Here, we describe a method for deterministically generating remote entanglement between two qubits that have never interacted using local operations on pairs of separated qubits. We present first in Sec. 3 a general scheme that relies on classical communication between the remote parties, where the degree of entanglement created can be tuned by the choice of encoding parameters. From this construction, we consider in Sec. 4 a special case where the communication requirement is eliminated and the resulting entanglement between the remote parties is maximal. Unlike standard entanglement swapping protocols [12], this scheme generates remote entanglement without joint measurements and, in the special case discussed in Sec. 4, utilizes only operations applied locally to the qubit pairs.

2 Encoding scheme

The goal of our procedure is to generate entanglement between two systems and that have never interacted. First, we consecutively entangle four qubits , , , and with a quantum system to generate the joint state . Then, the qubit pairs and are sent to remote locations where, finally, and are disentangled locally to create the entangled pair in product with (see Fig. 1).

Figure 1: Remote entanglement between and is generated by first entangling (wavy lines) four systems , , , and with a quantum state , moving the pairs and to remote locations, and then disentangling , , and via local operations (rectangular boxes) and possibly communication (arrow), so that the entangled pair is fully disentangled from the rest.

The protocol sketched in Fig. 1 appears formally similar to entanglement purification protocols [13], whose purpose is to distill pure entangled states from entangled mixed states. Such protocols are iterative, and act on copies of the quantum state to distill pure entangled states that can then be used as a resource for other protocols, and either require one-way or two-way communication between the remote destinations. The purpose of the present protocol is different: we prepare the initial quantum state in a defined manner so that remote bi-partite entanglement can be “activated” on demand, using one-way communication in general, and without any communication in special cases.

To enable this protocol, four ancillary qubits , , , and are first encoded via a sequence of measurements [14] of a quantum system . These measurements are equivalent to the unitary entangling operations implemented in weak measurements [15, 16, 17, 18, 19, 20], but the interactions considered here are strong (see, e.g., [21, 22]). As we will see, the degree of entanglement of the resulting state will depend on the relative angles between measurement bases.

The density matrix of the initial qubit quantum system is taken to be proportional to the identity matrix, , so that it is a maximum entropy state. The four consecutive entangling operations between the quantum system and the ancillary qubits lead to the total wave function [23, 14],

(1)

where the initial mixed state of has been purified with a reference system and each system is of dimension two so that entropies are in units of bits. The measured observables of are related through the matrix elements of , , and that specify the measurement bases. That is, the eigenbasis of the first observable (indexed by ) measured using qubit is rotated relative to the eigenbasis of the second observable (indexed by ) measured with according to . Similar expressions hold for , where the third observable (indexed by ) is measured using , and for , where the fourth (indexed by ) is measured with . Since the measurements are strong, the final states of the ancillary qubits in (1), , , , and , are orthogonal.

Without loss of generality we can consider only measurements of observables corresponding to the plane of the Bloch sphere, so that the transformation can be implemented with

(2)

for a rotation by an angle , and similarly for and with angles and , respectively. With this parametrization, a rotation by from, e.g., the eigenbasis of yields the eigenbasis of .

The encoding operation starts by consecutively entangling qubits and with , with a relative angle of between the first two observables, and sending them to Alice. Qubits and are subsequently entangled with , with a relative angle between the last two observables, and are sent to Bob. As we will see, the relative angle between the second and third observables can be left arbitrary implying that it is not necessary for Alice or Bob to know the measurement bases the other chose. The resulting chain (1) of ancillary qubits is coherent [14], and it is this fact that will allow us to deterministically create remote bi-partite entanglement.

The chain’s joint state can be written in terms of a new joint basis for and so that, tracing (1) over and , it appears as

(3)

The four non-orthogonal joint states of and ,

(4)

are normalized according to

(5)

To generate remote entanglement, Alice (who holds the pair ) and Bob (in possession of ) must perform a set of conditional unitary operations that are consistent with the choice of encoding parameters (, , and ), so that after the operations they share an entangled state of and that is in a product state with the rest of the system. As local unitary operations alone cannot change the entanglement of a state [24], remote entanglement can only be generated in this protocol by local operations on and when the entanglement entropies of each state in (4) are the same. The structure of these operations, and the restrictions that must be put on the angles in order to create a maximally entangled pair, will be examined next.

The first protocol we describe in Sec. 3 is the most general and can be implemented when Alice chooses the relative angle (Bob could, equivalently, pick ). We will see in Sec. 3 that, in this case, classical communication of the states of qubits and is required, but (of course) not of the states of and . Furthermore, the final degree of entanglement between and will depend only on Bob’s relative measurement angle , and not on .

In Sec. 4, we consider a special case of the general scheme where both the first and third relative angles are set to . We will find that communication about the states of and is no longer required and a maximally entangled state is deterministically extracted by operations applied locally to the two pairs of qubits. Interestingly, in the general and special cases, Alice and Bob do not need to communicate their measurement bases since the operations they implement are independent of all relative measurement angles, including the relative angle between the measurements with and .

3 Protocol with communication

The general protocol described here requires classical information to be communicated between Alice and Bob to generate remote entanglement. Using local operations on and in addition to classical communication about the states of and , a new joint state of and is generated that is entangled according to Bob’s relative measurement angle .

To encode the ancillary qubits, Alice selects the relative angle while Bob’s angle is left arbitrary. In this case, it is straightforward to show that the conditional joint states (4) of qubits and , which are functions of the relative angles and , can each be written in terms of local operations on the state ,

(6)

where

(7)

are conditional unitary operators on qubits and . Here, and are Pauli operators and the sum is modulo two. We write the state,

(8)

in terms of the generalized Bell basis,

(9)

Using (6), the joint density matrix (3) of all four qubits then becomes

(10)

We can see from (10) that if Alice and Bob apply the Hermitian conjugate of the operators (7), then qubits and will be left in the entangled state (8) that is in a product state with the rest of the system. This is the essence of the remote entanglement generation scheme.

The operation that disentangles the qubits and from the rest of the system takes the form

(11)

where the unitary operators were defined in (7). This expression does not completely factor into two separate operations on the pairs of qubits and , meaning that classical communication is necessary between Alice and Bob in order to implement (11). Indeed, it is clear from (7) that Alice must know the state of Bob’s qubit before performing her operations on and , while Bob does not need to know the state of Alice’s qubit (one-way communication). Despite the communication requirement, the operations (7) are independent of the angles and so that Alice and Bob do not need to know each other’s measurement bases.

After applying (11) to the state (10),

(12)

qubits and are left in the pure state (8), which is in a product state with and . In fact, and are disentangled from the entire system due to the symmetry of the underlying state (1).

The degree of entanglement of the final state (8) can be computed from the entanglement entropy, . This quantity characterizes the entanglement of a bipartite pure state, and is the same for each state (6) since local operations alone do not change the degree of entanglement. The entanglement entropy is computed from the von Neumann entropy of one of the subsystems, e.g., , and turns out to be independent of the angle ,

(13)

Evidently, the conditional states (6) are uncorrelated when () and are fully entangled when (). This second case is the one considered in Sec. 4 where the entanglement generated is maximal. Thus, Bob can control the entanglement of the final shared joint state (8) of and by choosing a particular relative angle .

3.1 Conditions for entanglement generation

In the most general scenario where all three relative angles are left arbitrary, the entanglement entropy of (4) must be a constant for all for local operations to successfully disentangle the joint state of qubits and from the rest of the system. In other words, it is necessary for the Schmidt coefficients of the Schmidt decomposition of each state (4) to be the same. This, however, does not guarantee that the resulting joint state of and at the end of the protocol will be entangled. For instance, at or , the entanglement entropies of (4) are indeed all the same, but vanish, so that the resulting joint state of and is completely uncorrelated and no shared entanglement is created.

Interestingly, the shared entropy of and vanishes,

(14)

only when nonzero entanglement between qubits and is successfully generated, and is otherwise positive. Given the correlated structure of the coefficients [see (5)] in the density matrix (found by tracing (3) over and ), a vanishing mutual entropy can only occur if at least one of the three angles is so that . In turn, this corresponds precisely to a constant and nonzero entanglement entropy. Thus, the necessary and sufficient condition for the entanglement generation scheme described here is simply (14).

Figure 2: The trace distance, , between (3) and (15) averaged over all intermediate measurement angles , as a function of . Here, .

3.2 Reliability

The encoding in this protocol serves to protect the conditional coherence of qubits and by correlating them with and . These correlations make it possible to generate shared entanglement between and without requiring joint measurements or even, as in the case of the protocol we discuss in Sec. 4, classical communication.

To quantify the effect of such correlations, we study the coherence of the joint state (3) of all four ancillary qubits before the disentangling operation (11) is applied. The closer the state (3) is to its classical counterpart, the more “robust” it may be to decoherence during the protocol. We determine how close is to the classical (completely decoherent) version denoted by , which has only diagonal elements, by computing the trace distance between (3) and

(15)

The trace distance [24], , between two states and is averaged over all intermediate angles and plotted in Fig. 2 for . The average trace distance remains less than one, suggesting that the protocol may be more robust to decoherence when qubits and are correlated with and . As Bob’s relative angle increases, increases and the resulting joint state (8) of and becomes more entangled.

4 Protocol without communication

The protocol described in Sec. 3 encoded the ancillary qubits with the relative angle , while and were left arbitrary. Here, we look at a special case of that general scheme where now the first and third relative angles are set to . We will see that the operators that replace (7) completely factorize in this case, which eliminates the communication requirement between Alice and Bob.

Setting , the conditional operators on and that appear in the density matrix (10) are now given by

(16)

There are two important features of (16). As before, the set of operators on and do not depend on the intermediate angle , but now they are completely factorized. That is, the operator , with only the index , is applied to qubit , while , with only the index , acts on qubit . As a consequence, Alice and Bob do not need to know the state of the other’s qubit in order to implement the operation

(17)

It is clear from (17) that if Alice and Bob each apply a controlled-phase gate to their pair of qubits (with the controls on and ), the resulting state will be (12), where is now given by

(18)

Here, we used the standard Bell basis,

(19)

where is the usual Bell state. The remaining three conditional joint states of and are obtained by applying (16) to the state (18).

Thus, with operations applied locally to their pairs of qubits, Alice and Bob extract a joint pure state of and that is in a product state with the rest of the system. We emphasize that this does not require any classical communication between Alice and Bob, and that afterwards they share one half each of the entangled state (18). It is easy to show that the state (18) is maximally entangled regardless of the angle (its entanglement entropy is equal to one). Since the operators (16) on and are independent of the angle , the protocol can be used even when Alice and Bob do not know each other’s measurement bases.

Figure 3: The trace distance, , between (3) and (15) as a function of the intermediate angle . Here, both Alice’s and Bob’s relative measurement angle is .

For the complete entanglement generation scheme without communication, refer to Fig. 1. In this protocol, the state of the four ancillary qubits after the encoding operations (the first four wavy lines) is given by (3) with , the rectangular boxes represent the controlled-phase gates in (17), and the arrow indicating classical communication is removed. The final state generated in the protocol corresponds to the maximally entangled state (18). We plot in Fig. 3 the trace distance between (3) and (15) with as a function of the intermediate angle and show that it remains less than one.

5 Discussion

We described two methods for generating shared entanglement between remote parties that have never interacted in the past. Both techniques are deterministic, based on a simple encoding scheme, and do not require the joint measurements used in entanglement swapping. The general scheme requires one-way classical communication between Alice and Bob, and the degree of entanglement extracted can be tuned by the choice of encoding parameters (the set of relative measurement angles). A particular encoding of the initial state makes this protocol work even in the absence of communication. In that case, operations applied locally to the qubit pairs are sufficient to deterministically generate a maximally entangled state.

We should point out that, given the nature of the state-preparation protocol, it is not necessary for the quantum states , , , and to be co-located with the initial quantum state when state preparation occurs, and then sent out to remote locations. Instead, we can imagine that the state is first sent to Alice at a remote location, who measures first with and then , then sends on to Bob at another location where he measures the same quantum system using and then .

In this work, we have not discussed the effect of noise on the present protocol (for example, due to entanglement with uncontrolled degrees of freedom), which would undoubtedly result in a success rate smaller than one. In particular, it is likely that entanglement is better protected from decoherence before disentanglement (akin to an error-correcting code), so that ideally the parties would wait to “activate” the entanglement until just before it is needed.

That maximum entanglement can be generated even when Alice and Bob do not know each other’s measurement bases (the disentangling operations are independent of the relative angle ) could make this a useful scheme for quantum key distribution protocols. In this case, it would be useful if Alice and Bob could independently verify the entanglement they share (see, e.g., [25]). Because before and after the entanglement between and is created, qubits and are unlikely to be helpful for this purpose. Future work should be able to throw light on this and other issues including the effectiveness of the protocol in the presence of noise or an eavesdropper.

References

  • Ekert [1991] A. K. Ekert. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett., 67:661–663, 1991. doi: 10.1103/PhysRevLett.67.661.
  • Bennett et al. [1993] C. H. Bennett, G. Brassard, C. Crépeau, R. Jozsa, A. Peres, and W. K. Wootters. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett., 70:1895–1899, 1993. doi: 10.1103/PhysRevLett.70.1895.
  • Chou et al. [2005] C.-W. Chou, H. De Riedmatten, D. Felinto, S. V. Polyakov, S. J. Van Enk, and H. J. Kimble. Measurement-induced entanglement for excitation stored in remote atomic ensembles. Nature, 438(7069):828–832, 2005. doi: 10.1038/nature04353.
  • Hofmann et al. [2012] J. Hofmann, M. Krug, N. Ortegel, L. Gérard, M. Weber, W. Rosenfeld, and H. Weinfurter. Heralded entanglement between widely separated atoms. Science, 337(6090):72–75, 2012. doi: 10.1126/science.1221856.
  • Moehring et al. [2007] D. L. Moehring, P. Maunz, S. Olmschenk, K. C. Younge, D. N. Matsukevich, L. M. Duan, and C. Monroe. Entanglement of single-atom quantum bits at a distance. Nature, 449:68–71, 2007. doi: 10.1038/nature06118.
  • Bernien et al. [2013] H. Bernien, B. Hensen, W. Pfaff, G. Koolstra, M. S. Blok, L. Robledo, T. H. Taminiau, M. Markham, D. J. Twitchen, L. Childress, and R. Hanson. Heralded entanglement between solid-state qubits separated by three metres. Nature, 497(7447):86–90, 2013. doi: 10.1038/nature12016.
  • Roch et al. [2014] N. Roch, M. E. Schwartz, F. Motzoi, C. Macklin, R. Vijay, A. W. Eddins, A. N. Korotkov, K. B. Whaley, M. Sarovar, and I. Siddiqi. Observation of measurement-induced entanglement and quantum trajectories of remote superconducting qubits. Phys. Rev. Lett., 112:170501, 2014. doi: 10.1103/PhysRevLett.112.170501.
  • Narla et al. [2016] A. Narla, S. Shankar, M. Hatridge, Z. Leghtas, K. M. Sliwa, E. Zalys-Geller, S. O. Mundhada, W. Pfaff, L. Frunzio, R. J. Schoelkopf, and M. H. Devoret. Robust concurrent remote entanglement between two superconducting qubits. Phys. Rev. X, 6:031036, 2016. doi: 10.1103/PhysRevX.6.031036.
  • Koshino et al. [2017] K. Koshino, K. Inomata, Z. R. Lin, Y. Tokunaga, T. Yamamoto, and Y. Nakamura. Theory of deterministic entanglement generation between remote superconducting atoms. Phys. Rev. Applied, 7:064006, 2017. doi: 10.1103/PhysRevApplied.7.064006.
  • Mor and Terno [1999] T. Mor and D. R. Terno. Sufficient conditions for a disentanglement. Phys Rev A, 60:4341–4343, 1999. doi: 10.1103/PhysRevA.60.4341.
  • Mor [1999] T. Mor. Disentangling quantum states while preserving all local properties. Phys. Rev. Lett., 83:1451–1454, 1999. doi: 10.1103/PhysRevLett.83.1451.
  • Żukowski et al. [1993] M. Żukowski, A. Zeilinger, M. A. Horne, and A. K. Ekert. “event-ready-detectors” Bell experiment via entanglement swapping. Phys. Rev. Lett., 71:4287–4290, 1993. doi: 10.1103/PhysRevLett.71.4287.
  • Bennett et al. [1996] C. H. Bennett, D. P. DiVincenzo, J. A. Smolin, and W. K. Wootters. Mixed-state entanglement and quantum error correction. Phys Rev A, 54:3824–3851, 1996. doi: 10.1103/PhysRevA.54.3824.
  • Glick and Adami [2017] J. R. Glick and C. Adami. Markovian and non-Markovian quantum measurements. arXiv:1701.05636, 2017.
  • Aharonov et al. [1988] Y. Aharonov, D. Z. Albert, and L. Vaidman. How the result of a measurement of a component of the spin of a spin- particle can turn out to be 100. Phys. Rev. Lett., 60:1351–1354, 1988. doi: 10.1103/PhysRevLett.60.1351.
  • Ritchie et al. [1991] N. W. M. Ritchie, J. G. Story, and R. G. Hulet. Realization of a measurement of a “weak value”. Phys. Rev. Lett., 66:1107–1110, 1991. doi: 10.1103/PhysRevLett.66.1107.
  • Hosten and Kwiat [2008] O. Hosten and P. Kwiat. Observation of the spin Hall effect of light via weak measurements. Science, 319(5864):787–790, 2008. ISSN 0036-8075. doi: 10.1126/science.1152697.
  • Lundeen et al. [2011] J. S. Lundeen, B. Sutherland, A. Patel, C. Stewart, and C. Bamber. Direct measurement of the quantum wavefunction. Nature, 474(7350):188–91, 2011. doi: 10.1038/nature10120.
  • Lundeen and Bamber [2012] J. S. Lundeen and C. Bamber. Procedure for direct measurement of general quantum states using weak measurement. Phys. Rev. Lett., 108(7):070402, 2012. doi: 10.1103/PhysRevLett.108.070402.
  • Dressel et al. [2014] J. Dressel, M. Malik, F. M. Miatto, A. N. Jordan, and R. W. Boyd. Colloquium: Understanding quantum weak values: Basics and applications. Rev. Mod. Phys., 86:307–316, 2014. doi: 10.1103/RevModPhys.86.307.
  • Nakamura et al. [2012] K. Nakamura, A. Nishizawa, and M.-K. Fujimoto. Evaluation of weak measurements to all orders. Phys. Rev. A, 85:012113, 2012. doi: 10.1103/PhysRevA.85.012113.
  • Vallone and Dequal [2016] G. Vallone and D. Dequal. Strong measurements give a better direct measurement of the quantum wave function. Phys. Rev. Lett., 116:040502, 2016. doi: 10.1103/PhysRevLett.116.040502.
  • Cerf and Adami [1998] N. J Cerf and C. Adami. Information theory of quantum entanglement and measurement. Physica D, 120(1-2):62–81, 1998. doi: 10.1016/S0167-2789(98)00045-1.
  • Nielsen and Chuang [2010] M. A. Nielsen and I. L. Chuang. Quantum Computation and Quantum Information: 10th Anniversary Edition. Cambridge University Press, 10th edition, 2010. doi: 10.1017/CBO9780511976667.
  • van Enk et al. [2007] S. J. van Enk, N. Lütkenhaus, and H. J. Kimble. Experimental procedures for entanglement verification. Phys. Rev. A, 75:052318, 2007. doi: 10.1103/PhysRevA.75.052318.
Comments 0
Request Comment
You are adding the first comment!
How to quickly get a good reply:
  • Give credit where it’s due by listing out the positive aspects of a paper before getting into which changes should be made.
  • Be specific in your critique, and provide supporting evidence with appropriate references to substantiate general statements.
  • Your comment should inspire ideas to flow and help the author improves the paper.

The better we are at sharing our knowledge with each other, the faster we move forward.
""
The feedback must be of minimum 40 characters and the title a minimum of 5 characters
   
Add comment
Cancel
Loading ...
102052
This is a comment super asjknd jkasnjk adsnkj
Upvote
Downvote
""
The feedback must be of minumum 40 characters
The feedback must be of minumum 40 characters
Submit
Cancel

You are asking your first question!
How to quickly get a good answer:
  • Keep your question short and to the point
  • Check for grammar or spelling errors.
  • Phrase it like a question
Test
Test description